keywords:
Bookmark and Share



Front Back
T/F: Security is the probability that a system will perform as expected for a specified period of time.
FALSE
Generally the more programs in memory, ________ of the processor.
the greater the utilization
The simplest approach to managing memory for multiple concurrent programs, ________, divides the available space into fixed‑length partitions each of which holds one program (4 words)
Fixed-partition memory management
T/F: The external paging device is usually RAM.
FALSE
With segmentation, programs are divided into independently addressed segments and stored in __________ memory.
Noncontiguous
On a segmented system the dynamically expanded address consists of __________.
A segment number, and
A displacement.
If a program attempts to modify (or sometimes even to read) the contents of memory locations that do not belong to it, the operating system's __________ routine intervenes and (usually) terminates the program.
Memory protection
____ protects your computer from viruses and spyware that may attempt to steal your password.
Secure Logon
____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.
Fast user switching
Holding down the ____ key during the boot process stops the automatic logon from occurring.
Shift
The ____ account is the most powerful local user account possible.
Administrator
The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.
Guest
The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.
Everyone
Members of the ____ group can back up and restore all files and folders on the computer.
Backup Operators
Members of the ____ group are able to monitor performance counters and access performance logs on the computer.
Performance Log Users
Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.
Performance Monitor Users
An administrator account derives its privileges from being a member of the local ____ group.
Administrators
The ____ applet in Control Panel is a simplified interface for user management.
User Accounts
The ____ profile is used when new user profiles are created.
Default
In Windows 7, the default profile is configured using ____.
Sysprep
T/F: The most critical effect of malware is degraded system performance.
FALSE
it is the least critical effect.

The most commonly used method for authentication is:
a username and password.
NTFS permissions can be easily circumvented when:
you have physical access to a computer.
T/F: In Windows 7, advanced audit policies can only be edited at a command-line.
FALSE
T/F: Every object in Windows 7 has audit events related to it.
TRUE
____ is a threat to privacy and often makes systems unstable.
Spyware or Viruses, Adware, Malware, Worms, etc.
A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.
Unhealthy, or Unsafe
While ____ is a great source of information, it is also the biggest source of malware (malicious software).
the Internet
____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.
Spyware (specifically)
The most basic level of data security in Windows 7 is ____ permissions.
NTFS
____ is the process of taking data and making it unreadable
Encryption
____ is the process of taking data that is unreadable and making it readable again.
Decryption
A(n) ____ encryption algorithm uses the same key to encrypt and decrypt data.
Symmetric
A(n) ____ encryption algorithm uses two keys to encrypt and decrypt data.
Asymmetric
A(n) ____ encryption algorithm is a one-way encryption, which means that it encrypts data, but the data cannot be decrypted.
Hash
T/F: The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
TRUE
T/F: Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
FALSE
T/F: DOS was designed as a multitasking operating system.
FALSE
T/F: Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
TRUE
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.
Hives
Major hives in Windows 7
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
____ hive contains global settings for the entire computer and the applications installed on it.
HKEY_LOCAL_MACHINE
____ hive contains details about the current hardware profile in use.
HKEY_CURRENT_CONFIG
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.
REGEDIT.EXE
The owner of the registry keys is usually listed as ____.

Choices are: Admin, Owner, Controller, and System
System
The Run As feature has been modified in Windows 7 to now be known as the ____ option.
Run as Administrator
Top 10 DOS Commands
cd - change directory
dir - directory details
copy - copy files
del - delete files
edit - edit file
move - move file
ren (rename)
deltree - 
cls - clear screen
format - 
The layer in Windows 7 that sits between the Operating System and the Hardware layer is the ______. The kernel in the OS layer communicates with it.
Hardware Abstraction Layer (HAL)
Security Policies of Windows 7
Account Policy
Local Policy
Public Key Policy
Windows Firewall with Advanced Security
Network List Manager Policy
Software Restriction Policy
Application Control Policy
IP Security Policies on Local Group
Advanced Audit Policy Configuration
The executive services are:
(eleven items)
-Executive Services-

-I/O Manager-

-Security Reference Moniter-

-Virtual Memory Manager (VMM)-

-Inter-Process Communications (IPC) Manager-

-Process Manager-

-Plug&Play Manager (PnP)- 

-Power Manager-

-Windows Manager-

-Graphics Device Interface (GDI)-

-Objects Manager-
|< Previous x of y cards Next >|